Authenticated encryption (AE) is used in a wide variety of applications, potentially in settings for which it was not originally designed. Recent research tries to understand what happens when AE is not used as prescribed by its designers. A question given relatively little attention is whether an AE scheme guarantees ``key commitment\u27\u27: ciphertext should only decrypt to a valid plaintext under the key used to generate the ciphertext. Generally, AE schemes do not guarantee key commitment as it is not part of AE\u27s design goal. Nevertheless, one would not expect this seemingly obscure property to have much impact on the security of actual products. In reality, however, products do rely on key commitment. We discuss three recent appli...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in a...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
Recently, there has been a surge of interest in the security of authenticated encryption with associ...
Authenticated encryption (AE) is a cryptographic primitiveproviding message privacy and authenticity...
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refe...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
Abstract. An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like ran...
We study authenticated encryption (AE) schemes, or symmetric cryptographic protocols designed to pro...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in a...
Authenticated encryption is a cryptographic mechanism that allows communicating parties to protect t...
Recently, there has been a surge of interest in the security of authenticated encryption with associ...
Authenticated encryption (AE) is a cryptographic primitiveproviding message privacy and authenticity...
For an Authenticated Encryption with Associated Data (AEAD) scheme, the key committing security refe...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong no-tions ...
We propose definitions and constructions of authenticated encryption (AE) schemes that offer securit...
Secure and highly efficient authenticated encryption (AE) algorithms which achieve data confidential...
© International Association for Cryptologic Research 2014. Scenarios in which authenticated encrypti...
Abstract. An authenticated encryption scheme is deemed secure (AE) if ciphertexts both look like ran...
We study authenticated encryption (AE) schemes, or symmetric cryptographic protocols designed to pro...
Authenticated encryption (AE) schemes are symmetric-key encryption schemes ensuring strong notions o...
Leakage resilience (LR) and misuse resistance (MR) are two important properties for the deployment o...
We make a number of remarks about the AES-GCM-SIV nonce-misuse resistant authenticated encryption sc...
In this article, we analyse a block cipher mode of operation for authenticated encryption known as +...
We study Authenticated Encryption with Associated Data (AEAD) from the viewpoint of composition in a...